Episode 43 — Apply Cryptography to VPNs: What Tunnels Do, What They Don’t, and Why

This episode explains VPNs as cryptographic tunnels that protect traffic in transit while also introducing new trust and routing assumptions, which is a common GSEC scenario pattern. You’ll define what a tunnel provides, including confidentiality and integrity between endpoints, then clarify what it does not automatically provide, such as endpoint health, authorization correctness, or protection against malicious insiders already on the far side. We’ll compare typical VPN types conceptually, focusing on site-to-site versus remote access behavior, and we’ll connect authentication and key exchange choices to risks like stolen credentials, weak client verification, and misconfigured split tunneling that leaks traffic outside inspection paths. Scenarios include a remote user accessing sensitive systems through a VPN from an unmanaged device, a site-to-site tunnel that unintentionally bridges two trusted networks, and troubleshooting cases where traffic fails due to routing, MTU, or certificate validation problems. Best practices emphasize least privilege routing, strong authentication, device posture controls where feasible, logging for session accountability, and careful network segmentation so the VPN expands connectivity only as intended. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 43 — Apply Cryptography to VPNs: What Tunnels Do, What They Don’t, and Why
Broadcast by